{"id":2601,"date":"2024-10-22T15:22:08","date_gmt":"2024-10-22T15:22:08","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/our-services\/"},"modified":"2025-06-06T11:02:29","modified_gmt":"2025-06-06T11:02:29","slug":"our-services","status":"publish","type":"page","link":"https:\/\/www.hackmosphere.fr\/en\/our-services\/","title":{"rendered":"Our services"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;137deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/PATTERN-HEADER.png&#8221; background_position=&#8221;top_left&#8221; background_horizontal_offset=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;8vw||8vw||false|false&#8221; custom_padding_tablet=&#8221;15vw||15vw||true|false&#8221; custom_padding_phone=&#8221;20vw||20vw||true|false&#8221; bottom_divider_style=&#8221;asymmetric&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_phone=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c4d64208-0f63-40a8-bbdd-efdc4f45c38b&#8221; header_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||||false|false&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;left&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Our services<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Put your safety to the test<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;74%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">We offer ethical hacking services for all three links in the cybersecurity chain: cyber, physical and human. Our team helps you to identify your vulnerabilities and provides you with precise recommendations for correcting them effectively. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Request a quote&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2077&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Our expertise for your safety<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;76%&#8221; width_tablet=&#8221;88%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>We work with you to identify the weak points in your organization&#8217;s IT security, and help you prioritize the actions you need to take.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MjkiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/pentest-cybersecurite.png&#8221; alt=&#8221;Icon pentest cybersecurite&#8221; title_text=&#8221;Icon pentest cybersecurite&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Cyber pentesting<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Identify vulnerabilities, strengthen your defenses and stay one step ahead of cyberthreats with our cyber pentests.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4NTUiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Icon-Pentest-physique.png&#8221; alt=&#8221;Icon Pentest physical&#8221; title_text=&#8221;Icon Pentest physical&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Physical Pentesting<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Enhance the security of your premises and protect your assets with our physical intrusion tests, designed to prevent intrusions and secure your spaces.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4NjYiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Phishing.png&#8221; title_text=&#8221;Phishing&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Phishing<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Assess the human risk and raise your employees&#8217; awareness of cybersecurity with our phishing campaigns. In this way, you reduce the chances of clicking on malicious e-mails.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; custom_padding=&#8221;15px|15px|15px|15px|true|true&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4NzciLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_color=&#8221;#B7F7CC&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Red-team.png&#8221; title_text=&#8221;Red team&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Red teaming<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Assess the resilience of your systems, employees and infrastructure by simulating a sophisticated Red Team attack.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;311deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||6vw||false|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Ethical hacking services tailored to your needs<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_orientation=&#8221;center&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We carry out comprehensive technical audits tailored to your needs, in black-box, gray-box or white-box versions.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;#0B4650&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;rgba(183,247,204,0.5)&#8221; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>BLACK BOX<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||10px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Black box intrusion test<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Our ethical hackers carry out penetration tests without any prior knowledge, assessing the resistance of the information system to external or internal attacks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;#0B4650&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;rgba(183,247,204,0.5)&#8221; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Grey BOX<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||10px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Grey box intrusion test<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">With user or internal network access, our ethical hackers test the system&#8217;s resistance to attacks resulting from an account leak or workstation compromise.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|19px|20px|19px|true|true&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;#B7F7CC&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;#0B4650&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;rgba(183,247,204,0.5)&#8221; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>WHITE BOX<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#FCFCFC&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4>White-box intrusion test<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">With full access to source code and configuration, our hackers anticipate risks by assessing resistance to internal malware or long-term attacks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||||false|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;74f91c42-4ba7-4cbe-881f-bf82609ea1e5&#8243; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||10px||false|false&#8221; header_3_text_align_tablet=&#8221;left&#8221; header_3_text_align_phone=&#8221;left&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-weight: 400;\">Receive a complete report on your security level<br \/><\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; text_orientation=&#8221;center&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;left&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>From analyzing your needs to delivering a detailed report, we&#8217;re with you every step of the way.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Diagnostic.png&#8221; title_text=&#8221;Diagnosis&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>DIAGNOSTIC<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Discuss your needs<br \/>\n<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Let&#8217;s talk about your requirements. We&#8217;ll then provide you with a customized sales proposal. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Tests.png&#8221; title_text=&#8221;Tests&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>TEST EXECUTION<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Test your cyber security<br \/>\n<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;95%&#8221; width_tablet=&#8221;95%&#8221; width_phone=&#8221;95%&#8221; width_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">Let us carry out the security tests you have selected, to identify any associated vulnerabilities.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||true|true&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221; box_shadow_blur__hover=&#8221;20px&#8221;][et_pb_image src=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/Inte\u0301grite\u0301.png&#8221; title_text=&#8221;Integrity&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;20%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;left&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; text_font=&#8221;Inter|600|||||||&#8221; text_text_color=&#8221;#FCFCFC&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#1A1A31&#8243; header_4_font=&#8221;Inter|||on|||||&#8221; header_4_text_color=&#8221;#1A1A31&#8243; header_4_font_size=&#8221;14px&#8221; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>DETAILED DELIVERABLE<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;11c3e866-10b0-4768-9648-3cd08582c530&#8243; header_4_text_color=&#8221;#1A1A31&#8243; custom_margin=&#8221;||5px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span style=\"font-weight: 400;\">Get a full report<br \/>\n<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; text_text_color=&#8221;#1A1A31&#8243; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">We improve your safety by implementing the recommendations you will receive in a detailed report, the week following the tests.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;311deg&#8221; background_color_gradient_stops=&#8221;#1a1a31 0%|#0b4650 100%&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;||6vw||false|false&#8221; custom_padding_phone=&#8221;50px||50px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(252,252,252,0.15)&#8221; background_image=&#8221;https:\/\/www.hackmosphere.fr\/wp-content\/uploads\/2024\/10\/CTA.png&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_tablet=&#8221;80px|50px|80px|50px|true|true&#8221; custom_padding_phone=&#8221;30px|20px|30px|20px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;04aefc12-0bc2-42e3-86c5-dd2d05a7cf91&#8243; header_2_text_color=&#8221;#FCFCFC&#8221; width=&#8221;67%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"font-weight: 400;\">Use our ethical hackers to test your security<br \/><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c170891f-9edb-4d5a-8298-f6c4e317d5cd&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-20px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Get in touch with us now to protect your organization effectively.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE3ODAiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8221; button_text=&#8221;Request a quote&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.25.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#1A1A31&#8243; button_bg_color=&#8221;#01DC94&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;12px&#8221; button_font=&#8221;Inter||||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#1A1A31&#8243; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|50px|10px|30px|true|false&#8221; global_module=&#8221;2077&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#B7F7CC&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our servicesPut your safety to the testWe offer ethical hacking services for all three links in the cybersecurity chain: cyber, physical and human. Our team helps you to identify your vulnerabilities and provides you with precise recommendations for correcting them effectively. Our expertise for your safetyWe work with you to identify the weak points in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"Discover our ethical hacking services","_seopress_titles_desc":"We offer pentesting services for all three links in the cybersecurity chain: cyber, physical and human.","_seopress_robots_index":"","_seopress_analysis_target_kw":"pentest","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2601","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2601"}],"version-history":[{"count":11,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2601\/revisions"}],"predecessor-version":[{"id":3167,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2601\/revisions\/3167"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}